Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Android Catching iOS

January 31, 2012 by  
Filed under Consumer Electronics

Comments Off on Android Catching iOS

Tablet computers loaded with Google’s Android operating system narrowed the lead of Apple’s iPad on the global market in the fourth quarter, research firm Strategy Analytics said on Thursday.

Global tablet shipments reached an all-time high of 26.8 million units in the fourth quarter, growing 2-1/2 fold from 10.7 million a year earlier, the research firm stated.

“Dozens of Android models distributed across multiple countries by numerous brands such as Amazon, Samsung, Asus and others have been driving volumes,” analyst Neil Mawston said in a statement.

Android’s market share rose to 39 percent from 29 percent a year earlier, while Apple’s share slipped to 58 percent from 68 percent a year before.

The tablet computer market grew 260 percent last year to 66.9 million units as consumers are increasingly buying tablets in preference to netbooks and even entry-level notebooks or desktops.

Source…

Symantec Admits Network Was Hacked

January 24, 2012 by  
Filed under Security

Comments Off on Symantec Admits Network Was Hacked

Symantec today reversed course away from earlier statements regarding the theft of source code of some of its flagship security products, now admitting that its own network was breached.

In a statement provided to the Reuters news service, the security software giant acknowledged that hackers had broken into its network when they stole source code of some of the company’s software.

Previously, Symantec had denied that its own network had been breached, and instead pointed fingers at an unnamed “third party entity” as the attack’s victim. Evidence posted by a hacker nicknamed “Yama Tough” — a self-proclaimed member of a gang calling itself “Lords of Dharmaraja” — indicated that the information was obtained from a server operated by the Indian government.

Two weeks ago, Symantec spokesman Cris Paden said that the hacker made off with source code of Symantec Endpoint Protection 11.0 and Symantec Antivirus 10.2, enterprise products between five and six years old.

Source….

Do You Trust Data-recovery Providers?

January 20, 2012 by  
Filed under Computing

Comments Off on Do You Trust Data-recovery Providers?

Data-recovery service providers are tasked with saving important data for you when something goes wrong — a drive crashes or storage device is dropped, and no backup is available. But do you trust them with the important data you let them recover or could they actually be a source for a data breach?

A survey of 769 IT professionals published this week finds those surveyed need to find out more about the third-party data-recovery services their organizations use. For example, according to the survey, 67% felt that encryption they had in place protected their organizations from data loss or theft during the data recovery process. But encryption keys are often handed over to the third-party data recovery service provider as part of the process, according to the study done by Ponemon Institute.

Ponemon’s “Trends in Security of Data Recovery Operations” report says of the 87% of survey respondents who said their organization had at least one data breach in the past two years, “21% say the breach occurred when a drive was in the possession of a third-party data service provider.”

Source…

Symantec’s Virus Code Hacked

January 14, 2012 by  
Filed under Computing

Comments Off on Symantec’s Virus Code Hacked

Symantec is looking into an Indian hacking group’s claims that it accessed source code used in the company’s flagship Norton Antivirus program.

A spokesman for the company on Thursday said that one claim by the group was false, while another is still being investigated.

Meanwhile, the Indian group, which calls itself Lords of Dharmaraja, has threatened to publicly disclose the source code very soon.

On Wednesday, the group posted on Pastebin what it claimed was confidential documentation related to Norton AntiVirus source code. A review of the material showed what appears to be a description of an application programming interface (API) for Symantec’s AV product.

The group also posted what it claimed was the complete source code tree file for Norton Antivirus. That document appears to have been taken down.

‘Yama Tough,’ the hacker who posted the documents, released at least two more on Google+ allegedly related to Symantec source code. One of the documents appears to be a detailed technical overview of Norton Anti-Virus, Quarantine Server Packaging API Specification, v1.0. The other document, from 2000, describes a Symantec Immune System Gateway Array Setup technology.

.

Source…

Windows 8 Tablet Being Developed By ASUS

January 5, 2012 by  
Filed under Computing

Comments Off on Windows 8 Tablet Being Developed By ASUS

Chinese newspapers have indentified Asustek as one of five international PC brands that will work with Microsoft on the “Windows on ARM” (WOA) architecture.

Microsoft is to release its first operating system that supports chips from Arm next year. Only five PC brands have been invited by Microsoft to join WOA, a development project that shows its aggressiveness in tapping the burgeoning tablet PC market. Asustek is the latest announcement. So far Samsung, Toshiba, HP and Lenovo have been identified as working with Microsoft to develop notebooks and tablets that run on WOA architecture.

Source…

Yahoo Wins Major Lawsuit

December 17, 2011 by  
Filed under Around The Net

Comments Off on Yahoo Wins Major Lawsuit

Yahoo has achieved a big victory against spammers, a legal victory that also includes a default judgment of $610 million.

In the lawsuit, filed in May 2008, Yahoo targeted a variety of individuals and companies, accusing them of trying to defraud people via a spam campaign that falsely informed email recipients that they had won prizes in a non-existent Yahoo-sponsored lottery.

Yahoo alleged that the defendants’ goal was to trick email recipients into providing them with personal and financial information that could be used to commit fraud by raiding victims’ bank accounts, using their credit cards and applying for loans on their behalf.

Judge Laura Taylor Swain from the U.S. District Court for the Southern District of New York ruled that Yahoo’s allegations are “uncontroverted” and said the company is entitled to $27 million in statutory damages for trademark infringement and $583 million in statutory damages for violation of the CAN-SPAM Act.

It’s not clear whether Yahoo will be able to collect the money. A default judgment is rendered when defendants in a case fail to plead or defend an action, as happened in this case, in which the defendants never responded to Yahoo’s complaint.

Source…

IBM Goes Social

December 12, 2011 by  
Filed under Around The Net

Comments Off on IBM Goes Social

Responding to increased use of tablets within business settings, IBM will launch on Wednesday several mobile applications designed to let employees use IBM enterprise social collaboration software with iPads and other mobile devices.

The new applications, free to customers with active licenses of the IBM software, have been built specifically for tablet interfaces and have security, IT management and compliance features.

“The apps are very lightweight and talk directly back in a secure manner to the enterprise systems that people who don’t have these devices are using inside the company,” said Rob Ingram, senior manager of IBM’s Mobile Collaboration Strategy.

One of the applications lets employees use IBM Connections via iPads, while another one is for LotusLive Meeting users to participate in online meetings using iPhones or Android, BlackBerry or iPad tablets.

For IBM Sametime, another application lets employees engage in one-on-one or group instant messaging sessions on iPad and Android tablets. There is also one application for Lotus Symphony Viewer that lets users view ODF-based files, including documents, spreadsheets and presentations, on iPads, iPhones or Android devices.

There are also applications for managing telephony tasks within IBM Sametime from tablets and for Android device users to add widgets to home screens as shortcuts to their Lotus Notes mail and calendar.

Source…

White House Threatens Net Veto

November 14, 2011 by  
Filed under Internet

Comments Off on White House Threatens Net Veto

The executive office of U.S. President Barack Obama stated Tuesday that the White House strongly opposes passage in the Senate of a resolution that could impact the equal availability of the Internet to all classes of users.

The resolution introduced in the Senate disapproves a rule submitted by the Federal Communications Commission in December on the net neutrality issue, and states that it should have “no force or effect”.

If the President is presented with the resolution, S.J. Res. 6, which would not safeguard the free and open Internet, his senior advisers would recommend that he veto it, the administration said.

The FCC Report and Order adopted the rule that fixed broadband providers may not unreasonably discriminate in transmitting lawful network traffic”. A “no blocking” rule states that fixed broadband providers may not block lawful content, applications, services, or non-harmful devices. Mobile broadband providers are also prohibited from blocking lawful websites, or block applications that compete with their voice or video telephony services.

The U.S. House of Representatives has already passed in April a Republican-backed resolution disapproving the FCC rules, and asking for their roll back.

Source

AMD To Slash A 10th Of Its Workforce

November 12, 2011 by  
Filed under Computing

Comments Off on AMD To Slash A 10th Of Its Workforce

Advanced Micro Devices Inc revealed a plan on Thursday to save about $200 million of operating costs in 2012 by cutting 10 percent of its global workforce and streamlining internal business processes.

The layoffs mark the first major move by Chief Executive Rory Read, who took the helm in August to try to galvanize a microprocessor maker that has bled market share to larger rival Intel Corp, while missing out on the mobile device boom.

“It’s not too surprising given the operating background of the new CEO and this is exactly what you’d bring an outsider in to do, but their problems go far deeper right now,” said Alex Gauna, an analyst at JMP Securities.

The layoffs should be completed in 2012′s first quarter, AMD said in a statement. Savings generated could help bankroll research and expansion into areas such as low-power chips, emerging markets and cloud computing next year.

In late September AMD, a distant second to Intel in selling microprocessors that are the brains of PCs, warned of manufacturing problems manufacturing it new 32 nanometer Llano chips as well as older 45 nanometer chips.

Source….

HP Makes Changes At The Top

November 9, 2011 by  
Filed under Computing

Comments Off on HP Makes Changes At The Top

HP has appointed former Boeing Company executive John Hinshaw as CIO.

In the newly created role of EVP of Global Technology and Business Processes, Hinshaw will oversee IT and shared and administrative services, including indirect and services procurement. Hinshaw also will be in charge of optimising business processes across the company.

Hinshaw was previously VP and general manager of Boeing Information Solutions at The Boeing Company, where he was responsible for running a new business.

Prior to Boeing, Hinshaw was SVP and CIO at Verizon Wireless. Earlier in his career he also served as a consultant with Accenture.

Hinshaw will join HP as a member of its executive council on 15 November, reporting to HP president and CEO Meg Whitman.

Meanwhile, HP also announced that Craig Flower has been promoted to SVP and CIO. Flower will be responsible for data management, application architecture, global business intelligence, sales, and product development and engineering applications. Flower has held a wide range of IT management positions within HP since 1984.

Source….

« Previous PageNext Page »